Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
2944e05ddaa58242d03ed0280526764f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2944e05ddaa58242d03ed0280526764f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2944e05ddaa58242d03ed0280526764f_JaffaCakes118.html
-
Size
213KB
-
MD5
2944e05ddaa58242d03ed0280526764f
-
SHA1
08c08c7ef799dccd0dc94b76d7f5ea32e09de0c9
-
SHA256
6b026aa822c6b8dc0d3beeca94b0cc0a36160379cb4cd10b227b377099e519fa
-
SHA512
8bcdb8f013538c16daf716f5a52bec25ac16cb71ed7470503d394a5f6855dff4abd9fc1ed1332336b2d2a3f48de1528f6f6e2acad49fb478f743e212dc700c91
-
SSDEEP
3072:erhB9CyHxX7Be7iAvtLPbAwuBNKifXTJx:mz9VxLY7iAVLTBQJlx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B611EA81-8628-11EF-9F4F-6E295C7D81A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a093978a351adb01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434631355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000184726762f10b329d8d8903743a90933d75be4a923efa0a1e3ab8f75105cc045000000000e80000000020000200000008c61bb1189f542b3bfdb08166a064c9aac466baf09be320a866021cc4dc541792000000075b51ae7d46f2455875d2622968292bb3dc9d4d69b006f1f9e30f9f2210f4b8c400000004da8c1d23bfedd3d57909d1d9d4cd649a16821cb990183a09c93dead2b47ec76c8b639b91ae8c0e286802d977dfbc69585e4d10dff0056a9ac608087fd444685 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3060 2100 iexplore.exe 30 PID 2100 wrote to memory of 3060 2100 iexplore.exe 30 PID 2100 wrote to memory of 3060 2100 iexplore.exe 30 PID 2100 wrote to memory of 3060 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2944e05ddaa58242d03ed0280526764f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efceb0f1e0e2c541d7ccc313cd7ef01c
SHA1ef2533ed7459c5af1e1529775ecaadc825050707
SHA2561c3f44e7829fce8891e7bd402f0087752ca3d1f8c3a7c6cc4157fe9d73751750
SHA512682cb3314e672222dc046a9ff8ec6e6bac2a96a40d89db39346a7222fdf74f9cfcd74f702341761b3b4947c552ef67fdfdaf3f09f1ac861beb140e179c1e82bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59991337fb6403e3944abee71a219816a
SHA1d681b7ac244893b437acade9e4d96041299947f9
SHA256d879757b638a76269528cd4dd96707399aa54e6e9c205892d09626ec9882f284
SHA512437bf673bbae17674ee0ffb0cf323993a216dfd61bb55e997fa7d0dae8193677df46b3cd37b3765f251db6d0109bc886b9d3abed294a3fc8f79ef4b8fb0a59a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3b4773c2a5163c381dd7ef13f60763
SHA1a65957d08b0e413a9619bb3d2ba89176ed667552
SHA25691753bd4061dd7ff3df9de529c3199ab2ac0744b66c74055119f5c674d64827a
SHA5128566e9dfb3e2407dc4f72e557f2a4390787593c784ed4662c3e42a90a52836fa10b5779fba540ecc443bbd364392f4c41bbdd04bb0f09c7bfa8e7696eb1df05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80ab08f8e72b26995db4b31438b91d0
SHA14836a62f26fa7cfe3954fdbc46b07fdd3af3e292
SHA2564ad9b8d1db424cd320528dc0b57ae47dc4e2a0504b83a32319b2cf8bda0f6d28
SHA5124ffa015a42bc1958adf55641ad7413ffde46c0d2919d72e330c99cf23b97bd59a8eadb56052cc826b82e660fbb27ea8f8d2326416038e636767c836dbf312da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f46f1a91a45c4f86fb958c267ba39b
SHA178739cc5e4c185e04d9216c0b8af7c30111981d2
SHA2567147e42717e37aa30c1e528ecc4f423ff74f007e93a3687f6f91dc3c5b0d1bbe
SHA5124ed03e2c11a7addec014083eb06d17b985eb5b41423c541c6097721df94922fe84380c23fef2bb76767d529e12955946afa2fd99ecbc17ab22e02dbad2973f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d66f1bd3276099ded1d84b0c796235
SHA1fe7c79c667d737533333f39170f45cf364e3bd5e
SHA256db599934bb6bc1dad5dfab2d06c26646089edb7497fc7255032c454da68fc48c
SHA512fbe39094c3aefd41bb8b053927c2352468914016eded959f67e72cfd3ed5865f3f8a528befb04d85412547f31fe441682957cfa1e3300f10b50593929e863451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d95d42f7f6645eb35964758005df0c5
SHA1ed226437098f11e4e8d089a3cefb3c430adc9597
SHA256cf54a0de2af9cc27aae0620adfb45d35f6a67440bb1bcf73d80b5d85029c6315
SHA512271b9e4844c1c6cd826bc9aaa4913115bdeacd9b4f8ded6efc3fdd82d9b9c9db1c3669a297b76bd16b732bdab8b590279d4e8c59c7c4273b3688b9cd843ef62b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b99475033260b195c187ad9a886de6
SHA194270d7d577bc316d38bac02e8c6cd19d7a68521
SHA256fd4f9d20e0b4e52b54689cd33aa71b8619d16fb4168b15e01547fa0f821566b3
SHA512a6381430e8b92a7f72df60e995da0609e7feb88a37c93452aa21ebae7084a906e18cb04ec43570822d7a228b480a317676976a00e232b2d9e98d3f2b06c457c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5671b5bd9a0b8bce517d22e154d2f44f2
SHA10830f02d2e3893a397104007c421891c18d90578
SHA256f575016b3be21d954ea180ab401654a4dd151e0093e4735481c1cd99491ffc21
SHA5121cd001b5b1442d126ab0fdcd9a5c791634964059f76daf0f040b11e199e53db72d05d33d795edb14cad9a31d2d9604097c6d3faa44ed8b455be64a12c5b3e1e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567533097ba1ce2bc79bc3fb84c8e1a0d
SHA18567660b74dfce1e2c6e81bbc743e339bc7ad9bf
SHA25626180188fe9490a4c6975cf0fbfcaba89c3328b29c5e25fb1a09512dbc271e43
SHA512758d559a973e593eb8b3e3c6be919495ea3246104e3745e2e387795054b2c2584206a344c26d54420ee5cd3a9d2515f48ed42f5782e1aef215840d06a472cf99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc35cfa5c3c2a8b3cd838d3f56664b54
SHA1aed1d7890f753282aa66d65a309f320763486f59
SHA2565f8a828090d9e181b825acf759e6dd1edb8a9679a2a0fbb6dae909c83280bbd3
SHA5122204e3eafb6b57151c0ba9bba2dd3ebfe316e4430bdfab736cea6fcd44895735e37cf0aae476dbd93c6ae22a94e279d52b5498b785ed78f3b2b412a0d791ce3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59156127d010cb7caab29b4b7b6749c1f
SHA14f0907c794a0d3aaac70cf2b15cfd7ef2937e68d
SHA256f882e16b11be5aa6031d3e9c9de8d7e626c54bfda06435cf73259bfeecccfdf3
SHA512cd08cf7414ed0d354ccb4cbdec8c8c124694eaf181d459b41d415223f0820b9bbb741208d54a4c7d3cc9936450773c5f04d5f1ea563b9fe19d751194fd40c06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ce789816bb7f78e7a987918900a810
SHA1262913878ede4bdb731cce1586ccfcf9a3c561de
SHA2562d2bcb8be50617491f1029bf507a38806a174375b5cda6bc15a2ae86667581d5
SHA512d238b00093529ceb7cd6332c8f87378dd278c19a80d222ffecbf33ac6587f41771c31dfe557639d2503479c497bfe2659dc8222f1a4040ac9f05dedc12467ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d138e4b524ef179e4ca22cdd782b677f
SHA127d70c929b36e0f23ca17c591df921de3cb21e50
SHA256012c210ac37d0a8d8482f38161805bcfb8fb6cbc3c84a80ae43f97e8338f1d41
SHA512d1b6438c2c3042ed034b5d13e32357ad293946c4f1bc9e739a6f5c505bc07843b662727bd819e2ecdfc4c150feee5e11babb0b6ce081340ff69b4bcdab3f3187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabee4c2c58fe879ae576588cea9bff9
SHA12540e593813a5c43969ec511421c0362383fefdb
SHA2568cdb352f1b2d34da070b2b37125d218b873ef9614922ed8e54959925951db369
SHA51251a815b6d4db132ed09ca1f7bfa9b81e7e7b87716080bc0d6b4bcb2d1b3abc8a91804422a21bc408ced2110201ace8ac4c78ba20ad160f5eb78b95e28f1da5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d35bc5c04c86da5621f093914821e9
SHA1cc3d8cccea9ba7052cc80f660542eb850b3009dc
SHA25644b589236dd2d2f3998403ebf758635b8092e4b1ddba481975bc6cf83821ed77
SHA512ad34a47a9642c0c25740ad4bb2c557c08dc6c206bbd0e2c909d5cf0cce81872924e9cf8a9e02259b9329bffa8c9372b25ae9b21f326ff6729b2cc5fd7605a95d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c695e98682d848c2cb5a8949d0dab6e5
SHA1304151ccea5d862c0bf2bd85bd73006d8df34771
SHA25683cfce8a7157423a870e3a7a6236b953d4ea1c9a5c2dbe34b090798a2b17d6f9
SHA5120b23433249db783777af7cba9ad8336a61463154f716b998d2783735028a27145087aec534bc210c49bedc9249d3f7b3ef4db2b49ab9776632747cc16b146685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5719b4403a1298014e73d69d7c5e6fbeb
SHA181f748feae8e82aa428342b602dd5ee5409ac726
SHA256ee6b04dfda96a0fd1cb1f05d7126b96c16d5edcaf49a69e90888d5406194bf33
SHA512b1fe71be5cae3cacaa13b2dd6af1b11c039315b30a26480a00e597aaea10367184382c380884ce3ede0d67e9c84df0ab21b4b7a7ce85345d8bb179d6fc02d64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f17fa89eeaea44421f4dbf829fc058
SHA17512f6cf927a24e80e7013746c6066becf1dc9cb
SHA2567e30deb54955b5b6fdbff9dc5e7f601ebf44223ca32b33b5b017f75e99198612
SHA5128423381792bf0efa5dfd5c44aa2c9e9f02684f2995edd7cc78b4a0bcbb47e1b9ebb975905fbc4ca4f04038bda9393060090b15e6b51b4d3df36dddde8d900c82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b